Memory management among levels of cache in a memory hierarchy
Methods, apparatus, and product for memory management among levels of cache in a memory hierarchy in a computer with a processor operatively coupled through two or more levels of cache to a main random access memory, caches closer to the processor in the hierarchy characterized as higher in the hierarchy, including: identifying a line in a first cache that is preferably retained in the first cache, the first cache backed up by at least one cache lower in the memory hierarchy, the lower cache implementing an LRU-type cache line replacement policy; and updating LRU information for the lower cache to indicate that the line has been recently accessed.
Latest IBM Patents:
This application is a continuation application of and claims priority from U.S. patent application Ser. No. 12/113,286, filed on May 1, 2008.
BACKGROUND OF THE INVENTION1. Field of the Invention
The field of the invention is data processing, or, more specifically methods, apparatus, and products for memory management among levels of cache in a memory hierarchy.
2. Description of Related Art
The development of the EDVAC computer system of 1948 is often cited as the beginning of the computer era. Since that time, computer systems have evolved into extremely complicated devices. Today's computers are much more sophisticated than early systems such as the EDVAC. Computer systems typically include a combination of hardware and software components, application programs, operating systems, processors, buses, memory, input/output devices, and so on. As advances in semiconductor processing and computer architecture push the performance of the computer higher and higher, more sophisticated computer software has evolved to take advantage of the higher performance of the hardware, resulting in computer systems today that are much more powerful than just a few years ago.
Computer systems often include a memory hierarchy of caches and main memory. Frequently used information may be stored in the caches for faster access than access from main memory. From time to time, frequently used information, preferably retained in an upper level cache, is evicted from the upper levels of cache due to an eviction of the same information in lower levels of cache causing a longer access time of the information upon a subsequent attempt to access the information.
SUMMARY OF THE INVENTIONMethods, apparatus, and product for memory management among levels of cache in a memory hierarchy in a computer with a processor operatively coupled through two or more levels of cache to a main random access memory, caches closer to the processor in the hierarchy characterized as higher in the hierarchy, including: identifying a line in a first cache that is preferably retained in the first cache, the first cache backed up by at least one cache lower in the memory hierarchy, the lower cache implementing an LRU-type cache line replacement policy; and updating LRU information for the lower cache to indicate that the line has been recently accessed.
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular descriptions of exemplary embodiments of the invention as illustrated in the accompanying drawings wherein like reference numbers generally represent like parts of exemplary embodiments of the invention.
Exemplary apparatus and methods for memory management among levels of cache in a memory hierarchy in accordance with the present invention are described with reference to the accompanying drawings, beginning with
The processor (156) in the example computer (152) of
Stored in RAM (168) is an application program (184), a module of user-level computer program instructions for carrying out particular data processing tasks such as, for example, word processing, spreadsheets, database operations, video gaming, stock market simulations, atomic quantum process simulations, or other user-level applications. Also stored in RAM (168) is an operating system (154). Operating systems useful for memory management among levels of cache in a memory hierarchy according to embodiments of the present invention include UNIX™, Linux™, Microsoft XP™, AIX™, IBM's i5/OS™, and others as will occur to those of skill in the art. The operating system (154) and the application (184) in the example of
The example computer (152) includes two example NOCs according to embodiments of the present invention: a video adapter (209) and a coprocessor (157). The video adapter (209) is an example of an I/O adapter specially designed for graphic output to a display device (180) such as a display screen or computer monitor. Video adapter (209) is connected to processor (156) through a high speed video bus (164), bus adapter (158), and the front side bus (162), which is also a high speed bus.
The example NOC coprocessor (157) is connected to processor (156) through bus adapter (158), and front side buses (162 and 163), which is also a high speed bus.
The NOC coprocessor of
The example NOC video adapter (209) and NOC coprocessor (157) of
The NOC video adapter and NOC coprocessor each also include a cache controller (111) that controls access to levels of cache (302). The cache controllers (111) in the example of
The NOC video adapter and the NOC coprocessor are optimized for programs that use parallel processing and also require fast random access to shared memory. The details of the NOC structure and operation are discussed below with reference to
The computer (152) of
The example computer (152) of
The exemplary computer (152) of
For further explanation,
In the NOC (102) of
One way to describe IP blocks by analogy is that IP blocks are for NOC design what a library is for computer programming or a discrete integrated circuit component is for printed circuit board design. In NOCs according to embodiments of the present invention, IP blocks may be implemented as generic gate netlists, as complete special purpose or general purpose microprocessors, or in other ways as may occur to those of skill in the art. A netlist is a Boolean-algebra representation (gates, standard cells) of an IP block's logical-function, analogous to an assembly-code listing for a high-level program application. NOCs also may be implemented, for example, in synthesizable form, described in a hardware description language such as Verilog or VHDL. In addition to netlist and synthesizable implementation, NOCs also may be delivered in lower-level, physical descriptions. Analog IP block elements such as SERDES, PLL, DAC, ADC, and so on, may be distributed in a transistor-layout format such as GDSII. Digital elements of IP blocks are sometimes offered in layout format as well.
Each IP block (104) in the example of
Each IP block (104) in the example of
Each IP block (104) in the example of
Each memory communications controller (106) in the example of
The example NOC of
The example NOC includes two memory management units (‘MMUs’) (107, 109), illustrating two alternative memory architectures for NOCs according to embodiments of the present invention. MMU (107) is implemented with an IP block, allowing a processor within the IP block to operate in virtual memory while allowing the entire remaining architecture of the NOC to operate in a physical memory address space. The MMU (109) is implemented off-chip, connected to the NOC through a data communications port (116). The port (116) includes the pins and other interconnections required to conduct signals between the NOC and the MMU, as well as sufficient intelligence to convert message packets from the NOC packet format to the bus format required by the external MMU (109). The external location of the MMU means that all processors in all IP blocks of the NOC can operate in virtual memory address space, with all conversions to physical addresses of the off-chip memory handled by the off-chip MMU (109).
In addition to the two memory architectures illustrated by use of the MMUs (107, 109), data communications port (118) illustrates a third memory architecture useful in NOCs according to embodiments of the present invention. Port (118) provides a direct connection between an IP block (104) of the NOC (102) and off-chip memory (112). With no MMU in the processing path, this architecture provides utilization of a physical address space by all the IP blocks of the NOC. In sharing the address space bi-directionally, all the IP blocks of the NOC can access memory in the address space by memory-addressed messages, including loads and stores, directed through the IP block connected directly to the port (118). The port (118) includes the pins and other interconnections required to conduct signals between the NOC and the off-chip memory (112), as well as sufficient intelligence to convert message packets from the NOC packet format to the bus format required by the off-chip memory (112).
In the example of
For further explanation,
The NOC (102) in the example of
In the example of
In the NOC (102) of
Each memory communications execution engine (140) is enabled to execute a complete memory communications instruction separately and in parallel with other memory communications execution engines. The memory communications execution engines implement a scalable memory transaction processor optimized for concurrent throughput of memory communications instructions. The memory communications controller (106) supports multiple memory communications execution engines (140) all of which run concurrently for simultaneous execution of multiple memory communications instructions. A new memory communications instruction is allocated by the memory communications controller (106) to a memory communications engine (140) and the memory communications execution engines (140) can accept multiple response events simultaneously. In this example, all of the memory communications execution engines (140) are identical. Scaling the number of memory communications instructions that can be handled simultaneously by a memory communications controller (106), therefore, is implemented by scaling the number of memory communications execution engines (140).
In the NOC (102) of
In the NOC (102) of
Many memory-address-based communications are executed with message traffic, because any memory to be accessed may be located anywhere in the physical memory address space, on-chip or off-chip, directly attached to any memory communications controller in the NOC, or ultimately accessed through any IP block of the NOC—regardless of which IP block originated any particular memory-address-based communication. All memory-address-based communication that are executed with message traffic are passed from the memory communications controller to an associated network interface controller for conversion (136) from command format to packet format and transmission through the network in a message. In converting to packet format, the network interface controller also identifies a network address for the packet in dependence upon the memory address or addresses to be accessed by a memory-address-based communication. Memory address based messages are addressed with memory addresses. Each memory address is mapped by the network interface controllers to a network address, typically the network location of a memory communications controller responsible for some range of physical memory addresses. The network location of a memory communication controller (106) is naturally also the network location of that memory communication controller's associated router (110), network interface controller (108), and IP block (104). The instruction conversion logic (136) within each network interface controller is capable of converting memory addresses to network addresses for purposes of transmitting memory-address-based communications through routers of a NOC.
Upon receiving message traffic from routers (110) of the network, each network interface controller (108) inspects each packet for memory instructions. Each packet containing a memory instruction is handed to the memory communications controller (106) associated with the receiving network interface controller, which executes the memory instruction before sending the remaining payload of the packet to the IP block for further processing. In this way, memory contents are always prepared to support data processing by an IP block before the IP block begins execution of instructions from a message that depend upon particular memory content.
In the NOC (102) of
Each network interface controller (108) in the example of
Each router (110) in the example of
In describing memory-address-based communications above, each memory address was described as mapped by network interface controllers to a network address, a network location of a memory communications controller. The network location of a memory communication controller (106) is naturally also the network location of that memory communication controller's associated router (110), network interface controller (108), and IP block (104). In inter-IP block, or network-address-based communications, therefore, it is also typical for application-level data processing to view network addresses as location of IP block within the network formed by the routers, links, and bus wires of the NOC.
In the NOC (102) of
Each virtual channel buffer (134) has finite storage space. When many packets are received in a short period of time, a virtual channel buffer can fill up—so that no more packets can be put in the buffer. In other protocols, packets arriving on a virtual channel whose buffer is full would be dropped. Each virtual channel buffer (134) in this example, however, is enabled with control signals of the bus wires to advise surrounding routers through the virtual channel control logic to suspend transmission in a virtual channel, that is, suspend transmission of packets of a particular communications type. When one virtual channel is so suspended, all other virtual channels are unaffected—and can continue to operate at full capacity. The control signals are wired all the way back through each router to each router's associated network interface controller (108). Each network interface controller is configured to, upon receipt of such a signal, refuse to accept, from its associated memory communications controller (106) or from its associated IP block (104), communications instructions for the suspended virtual channel. In this way, suspension of a virtual channel affects all the hardware that implements the virtual channel, all the way back up to the originating IP blocks.
One effect of suspending packet transmissions in a virtual channel is that no packets are ever dropped in the architecture of
For further explanation,
The method of
The method of
The method of
For further explanation,
A cache is a collection of data duplicating original values stored elsewhere or computed earlier, where the original data is expensive to fetch, due to longer access time, or to compute, compared to the cost of reading or writing to the cache. That is, a cache is a temporary storage area where frequently accessed data can be stored for rapid access. Once the data is stored in the cache, future use can be made by accessing the cached copy rather than re-fetching or recomputing the original data, so that the average access time is shorter. A cache helps expedite data access that a processor would otherwise need to fetch from main memory.
The hierarchical arrangement of storage in computer architectures is called a memory hierarchy. The memory hierarchy is designed to take advantage of memory locality. Each level of the hierarchy has properties of higher speed, smaller size, and lower latency than lower levels. Most modern CPUs are so fast that for most program workloads, the locality of reference of memory accesses and the efficiency of the caching and memory transfer between different levels of the hierarchy are the practical limitation on processing speed. As a result, the CPU spends much of its time idling, waiting for memory I/O to complete. A typical memory hierarchy in a computer system may include:
-
- Processor registers—a hierarchal level of memory having the fastest possible access of all levels, usually 1 CPU cycle, and only hundreds of bytes in size;
- Level 1 (‘L1’) cache—a hierarchal level of memory typically accessed in just a few CPU cycles, typically tens of kilobytes in size;
- Level 2 (‘L2’) cache—a hierarchal level of memory having 2 to 10 times higher latency than L1, typically 512 kilobytes or more in size;
- Main memory, such as ‘DRAM’—a hierarchal level of memory typically accessed in hundreds of CPU cycles, typical one or more gigabytes in size.
- Flash Memory—a hierarchal level having access times faster than disk storage, typically less than 8 gigabytes in size;
- Hard disk storage—a hierarchal level of memory in which access times range in the hundreds of thousands of CPU cycles, typically ranging in size from tens of gigabytes to terabytes;
- And so on with increasing access times and size as will occur to readers of skill in the art.
In memory hierarchies in which memory is managed in accordance with embodiments of the present invention, caches are typically implemented as write-through caches. That is, when a cache line is written to a cache of a particular level, the same cache line is also written to a cache in a lower level. The same cache line, therefore, typically exists in multiple levels of a cache in a memory hierarchy.
The method of
An attempt to access a cache line may result in a hit in a cache or a miss in a cache. If a cache line is hit in a cache, the cache line is accessed in the cache and the LRU information for the cache is updated to reflect the access. If a cache line is missed in a cache, an attempt to access the cache line in a lower level cache is made. A cache line, existing in both a higher and lower level cache, that is repeatedly accessed in the higher level cache, then, may rarely, if ever, be accessed in a lower level cache. In prior art, LRU information in the lower cache describing a cache line that is repeatedly accessed in the upper level cache may indicate that the cache line is one of the least recently used cache lines in the lower level cache, increasing the probability of eviction from the lower level cache. In memory hierarchies in which memory is managed in accordance with embodiments of the present invention, when a cache line, existing in both a higher and lower level cache, is evicted from the lower level cache in accordance with the LRU-type replacement policy, the cache line is also evicted from the higher level cache.
The method of
In the method of
In the method of
In the method of
In the method of
The method of
Exemplary embodiments of the present invention are described largely in the context of a fully functional computer system for memory management among levels of cache in a memory hierarchy. Readers of skill in the art will recognize, however, that the present invention also may be embodied in a computer program product disposed on signal bearing media for use with any suitable data processing system. Such signal bearing media may be transmission media or recordable media for machine-readable information, including magnetic media, optical media, or other suitable media. Examples of recordable media include magnetic disks in hard drives or diskettes, compact disks for optical drives, magnetic tape, and others as will occur to those of skill in the art. Examples of transmission media include telephone networks for voice communications and digital data communications networks such as, for example, Ethernets™ and networks that communicate with the Internet Protocol and the World Wide Web as well as wireless transmission media such as, for example, networks implemented according to the IEEE 802.11 family of specifications.
Persons skilled in the art will immediately recognize that any computer system having suitable programming means will be capable of executing the steps of the method of the invention as embodied in a program product. Persons skilled in the art will recognize immediately that, although some of the exemplary embodiments described in this specification are oriented to software installed and executing on computer hardware, nevertheless, alternative embodiments implemented as firmware or as hardware are well within the scope of the present invention.
It will be understood from the foregoing description that modifications and changes may be made in various embodiments of the present invention without departing from its true spirit. The descriptions in this specification are for purposes of illustration only and are not to be construed in a limiting sense. The scope of the present invention is limited only by the language of the following claims.
Claims
1. A method of memory management among levels of cache in a memory hierarchy in a computer with a processor operatively coupled through two or more levels of cache to a main random access memory, caches closer to the processor in the hierarchy characterized as higher in the hierarchy, the method comprising:
- identifying a line in a first cache that is preferably retained in the first cache upon an access of the line in the first cache, the first cache backed up by at least one cache lower in the memory hierarchy, the lower cache implementing a least recently used type (‘LRU-type’) cache line replacement policy;
- wherein the method is implemented on a network on chip (‘NOC’), the NOC comprising integrated processor (‘IP’) blocks, routers, memory communications controllers, and network interface controller, each IP block adapted to a router through a memory communications controller and a network interface controller, each memory communications controller controlling communication between an IP block and memory, and each network interface controller controlling inter-IP block communications through routers, wherein each router implements a plurality of virtual communications channels, the virtual communications channels characterized by different communication types.
2. The method of claim 1 wherein identifying a line preferably retained further comprises identifying the line as preferably retained on every access in the cache.
3. The method of claim 1 wherein identifying a line preferably retained further comprises:
- identifying the line as preferably retained when the line is accessed, not on every access, but only upon a randomly-selected subset of accesses.
4. The method of claim 1 wherein identifying line further comprises:
- identifying the line as preferably retained when the line is accessed, not on every access, but only periodically according to a predetermined interval of time.
5. The method of claim 1 wherein identifying line further comprises:
- identifying the line as preferably retained when the line is accessed, not on every access, but only periodically according to a predetermined number of accesses.
6. An apparatus for memory management among levels of cache in a memory hierarchy in a computer with a processor operatively coupled through two or more levels of cache to a main random access memory, caches closer to the processor in the hierarchy characterized as higher in the hierarchy, the apparatus comprising a computer processor, a computer memory operatively coupled to the computer processor, the computer memory having disposed within it computer program instructions capable of:
- identifying a line in a first cache that is preferably retained in the first cache upon an access of the line in the first cache, the first cache backed up by at least one cache lower in the memory hierarchy, the lower cache implementing a least recently used type (‘LRU-type’) cache line replacement policy; and
- wherein the apparatus further comprises a network on chip (‘NOC’), the NOC comprising integrated processor (‘IP’) blocks, routers, memory communications controllers, and network interface controller, each IP block adapted to a router through a memory communications controller and a network interface controller, each memory communications controller controlling communication between an IP block and memory, and each network interface controller controlling inter-IP block communications through routers, wherein each router implements a plurality of virtual communications channels, the virtual communications channels characterized by different communication types.
7. The apparatus of claim 6 wherein identifying a line preferably retained further comprises identifying the line as preferably retained on every access in the cache.
8. The apparatus of claim 6 wherein identifying a line in a first cache that is preferably retained in the first cache further comprises:
- identifying the line as preferably retained when the line is accessed, not on every access, but only upon a randomly-selected subset of accesses.
9. The apparatus of claim 6 wherein identifying a line in a first cache that is preferably retained in the first cache further comprises:
- identifying the line as preferably retained when the line is accessed, not on every access, but only periodically according to a predetermined interval of time.
10. The apparatus of claim 6 wherein identifying a line in a first cache that is preferably retained in the first cache further comprises:
- identifying the line as preferably retained when the line is accessed, not on every access, but only periodically according to a predetermined number of accesses.
11. A computer program product for memory management among levels of cache in a memory hierarchy in a computer with a processor operatively coupled through two or more levels of cache to a main random access memory, caches closer to the processor in the hierarchy characterized as higher in the hierarchy, the computer program product disposed in a non-transitory computer readable, recordable medium, the computer program product comprising computer program instructions capable of:
- identifying a line in a first cache that is preferably retained in the first cache upon an access of the line in the first cache, the first cache backed up by at least one cache lower in the memory hierarchy, the lower cache implementing a least recently used type (‘LRU-type’) cache line replacement policy; and
- wherein the computer program instructions are executed on a network on chip (‘NOC’), the NOC comprising integrated processor (‘IP’) blocks, routers, memory communications controllers, and network interface controller, each IP block adapted to a router through a memory communications controller and a network interface controller, each memory communications controller controlling communication between an IP block and memory, and each network interface controller controlling inter-IP block communications through routers, wherein each router implements a plurality of virtual communications channels, the virtual communications channels characterized by different communication types.
12. The computer program product of claim 11 wherein identifying a line preferably retained further comprises identifying the line as preferably retained on every access in the cache.
13. The computer program product of claim 11 wherein identifying a line preferably retained further comprises:
- identifying the line as preferably retained when the line is accessed, not on every access, but only upon a randomly-selected subset of accesses.
14. The computer program product of claim 11 wherein identifying line further comprises:
- identifying the line as preferably retained when the line is accessed, not on every access, but only periodically according to a predetermined interval of time.
15. The computer program product of claim 11 wherein identifying line further comprises:
- identifying the line as preferably retained when the line is accessed, not on every access, but only periodically according to a predetermined number of accesses.
4813037 | March 14, 1989 | Debuysscher et al. |
4951195 | August 21, 1990 | Fogg et al. |
5167023 | November 24, 1992 | De Nicolas et al. |
5301302 | April 5, 1994 | Blackard et al. |
5442797 | August 15, 1995 | Casavant et al. |
5590308 | December 31, 1996 | Shih |
5761516 | June 2, 1998 | Rostoker et al. |
5784706 | July 21, 1998 | Oberlin et al. |
5802386 | September 1, 1998 | Kahle et al. |
5870479 | February 9, 1999 | Feiken et al. |
5872963 | February 16, 1999 | Bitar et al. |
5884060 | March 16, 1999 | Vegesna et al. |
5887166 | March 23, 1999 | Mallick et al. |
5974498 | October 26, 1999 | Hopkins |
6021470 | February 1, 2000 | Frank et al. |
6044478 | March 28, 2000 | Green |
6047122 | April 4, 2000 | Spiller |
6049866 | April 11, 2000 | Earl |
6085296 | July 4, 2000 | Karkhanis et al. |
6085315 | July 4, 2000 | Fleck et al. |
6101599 | August 8, 2000 | Wright et al. |
6105119 | August 15, 2000 | Kerr et al. |
6119215 | September 12, 2000 | Key et al. |
6145072 | November 7, 2000 | Shams et al. |
6151668 | November 21, 2000 | Pechanek et al. |
6164841 | December 26, 2000 | Mattson et al. |
6179489 | January 30, 2001 | So et al. |
6272598 | August 7, 2001 | Arlitt et al. |
6292888 | September 18, 2001 | Nemirovsky et al. |
6298370 | October 2, 2001 | Tang et al. |
6370622 | April 9, 2002 | Chiou et al. |
6385695 | May 7, 2002 | Arimilli et al. |
6434669 | August 13, 2002 | Arimilli et al. |
6446171 | September 3, 2002 | Henriksen |
6493817 | December 10, 2002 | Renstrom |
6519605 | February 11, 2003 | Gilgen et al. |
6567084 | May 20, 2003 | Mang et al. |
6567895 | May 20, 2003 | Scales |
6591347 | July 8, 2003 | Tischler et al. |
6625662 | September 23, 2003 | Satoh et al. |
6668307 | December 23, 2003 | Damron |
6668308 | December 23, 2003 | Barroso et al. |
6675284 | January 6, 2004 | Warren |
6697932 | February 24, 2004 | Yoaz et al. |
6725317 | April 20, 2004 | Bouchier et al. |
6823429 | November 23, 2004 | Olnowich |
6832184 | December 14, 2004 | Bleier et al. |
6877086 | April 5, 2005 | Boggs et al. |
6891828 | May 10, 2005 | Ngai |
6898791 | May 24, 2005 | Chandy et al. |
6915402 | July 5, 2005 | Wilson et al. |
6938253 | August 30, 2005 | Kim |
6950438 | September 27, 2005 | Owen et al. |
6961824 | November 1, 2005 | Rowlands et al. |
6973032 | December 6, 2005 | Casley et al. |
6988149 | January 17, 2006 | Odenwald |
7010580 | March 7, 2006 | Fu et al. |
7015909 | March 21, 2006 | Morgan, III et al. |
7020751 | March 28, 2006 | Kershaw |
7072996 | July 4, 2006 | Adusumilli et al. |
7162560 | January 9, 2007 | Taylor et al. |
7376789 | May 20, 2008 | Halleck et al. |
7394288 | July 1, 2008 | Agarwal |
7398374 | July 8, 2008 | DeLano |
7464197 | December 9, 2008 | Ganapathy et al. |
7478225 | January 13, 2009 | Brooks et al. |
7493474 | February 17, 2009 | Pechanek et al. |
7500060 | March 3, 2009 | Anderson et al. |
7502378 | March 10, 2009 | Lajolo et al. |
7521961 | April 21, 2009 | Anderson et al. |
7533154 | May 12, 2009 | Chen et al. |
7539124 | May 26, 2009 | Rhim et al. |
7546444 | June 9, 2009 | Wolrich et al. |
7568064 | July 28, 2009 | Reblewski et al. |
7590774 | September 15, 2009 | Johns et al. |
7613882 | November 3, 2009 | Akkawi et al. |
7664108 | February 16, 2010 | Bahattab |
7689738 | March 30, 2010 | Williams et al. |
7701252 | April 20, 2010 | Chow et al. |
7861065 | December 28, 2010 | Heil et al. |
7882307 | February 1, 2011 | Wentslaff et al. |
7886084 | February 8, 2011 | Chen et al. |
7913010 | March 22, 2011 | Hoover et al. |
7917703 | March 29, 2011 | Comparan et al. |
7958340 | June 7, 2011 | Hoover et al. |
7991978 | August 2, 2011 | Kuesel et al. |
8010750 | August 30, 2011 | Comparan et al. |
8018466 | September 13, 2011 | Hoover et al. |
8020168 | September 13, 2011 | Hoover et al. |
8040799 | October 18, 2011 | Hoover et al. |
8214624 | July 3, 2012 | Berglas et al. |
8429661 | April 23, 2013 | Alfieri et al. |
20020099833 | July 25, 2002 | Steely et al. |
20020178337 | November 28, 2002 | Wilson et al. |
20030065890 | April 3, 2003 | Lyon |
20040037313 | February 26, 2004 | Gulati et al. |
20040078482 | April 22, 2004 | Blumrich et al. |
20040083341 | April 29, 2004 | Robinson et al. |
20040088487 | May 6, 2004 | Barroso et al. |
20040111594 | June 10, 2004 | Feiste et al. |
20040151197 | August 5, 2004 | Hui |
20040153579 | August 5, 2004 | Shih et al. |
20040216105 | October 28, 2004 | Burky et al. |
20040250046 | December 9, 2004 | Gonzalez et al. |
20040260906 | December 23, 2004 | Landin et al. |
20050044319 | February 24, 2005 | Olukotun |
20050086435 | April 21, 2005 | Todoroki |
20050097184 | May 5, 2005 | Brown et al. |
20050149689 | July 7, 2005 | Sodani et al. |
20050160209 | July 21, 2005 | Van Doren et al. |
20050166205 | July 28, 2005 | Oskin et al. |
20050198442 | September 8, 2005 | Mandler |
20050203988 | September 15, 2005 | Nolle et al. |
20050228952 | October 13, 2005 | Mayhew et al. |
20050238035 | October 27, 2005 | Riley |
20060095920 | May 4, 2006 | Gossens |
20060101249 | May 11, 2006 | Bacon et al. |
20060168430 | July 27, 2006 | Walterscheidt et al. |
20060190707 | August 24, 2006 | McIlvaine et al. |
20060203825 | September 14, 2006 | Beigne et al. |
20060209846 | September 21, 2006 | Clermidy et al. |
20060242393 | October 26, 2006 | Park et al. |
20070055826 | March 8, 2007 | Morton et al. |
20070055961 | March 8, 2007 | Callister et al. |
20070074192 | March 29, 2007 | Geisinger |
20070076739 | April 5, 2007 | Manjeshwar et al. |
20070180310 | August 2, 2007 | Johnson et al. |
20070226407 | September 27, 2007 | Radulescu et al. |
20070239888 | October 11, 2007 | Croxford |
20070271557 | November 22, 2007 | Geisinger |
20070283324 | December 6, 2007 | Geisinger |
20080028401 | January 31, 2008 | Geisinger |
20080074433 | March 27, 2008 | Jiao et al. |
20080133885 | June 5, 2008 | Glew |
20080134191 | June 5, 2008 | Warrier et al. |
20080181115 | July 31, 2008 | Soulie et al. |
20080186998 | August 7, 2008 | Rijpkema |
20080198166 | August 21, 2008 | Chung et al. |
20080205432 | August 28, 2008 | Gangwal |
20080216073 | September 4, 2008 | Yates et al. |
20080307422 | December 11, 2008 | Kurland et al. |
20080320235 | December 25, 2008 | Beckman et al. |
20090019190 | January 15, 2009 | Blocksome |
20090083263 | March 26, 2009 | Felch et al. |
20090109996 | April 30, 2009 | Hoover et al. |
20090122703 | May 14, 2009 | Gangwal et al. |
20090125574 | May 14, 2009 | Mejdrich et al. |
20090125703 | May 14, 2009 | Mejdrich et al. |
20090125706 | May 14, 2009 | Hoover et al. |
20090135739 | May 28, 2009 | Hoover et al. |
20090138567 | May 28, 2009 | Hoover et al. |
20090138670 | May 28, 2009 | Mutlu et al. |
20090157976 | June 18, 2009 | Comparan et al. |
20090182954 | July 16, 2009 | Mejdrich et al. |
20090187716 | July 23, 2009 | Comparan et al. |
20090201302 | August 13, 2009 | Hoover et al. |
20090210592 | August 20, 2009 | Hoover et al. |
20090210883 | August 20, 2009 | Hoover et al. |
20090213863 | August 27, 2009 | Denteneer et al. |
20090231349 | September 17, 2009 | Mejdrich et al. |
20090245257 | October 1, 2009 | Comparan et al. |
20090260013 | October 15, 2009 | Heil et al. |
20090271172 | October 29, 2009 | Mejdrich et al. |
20090271597 | October 29, 2009 | Kuesel et al. |
20090276572 | November 5, 2009 | Heil et al. |
20090282139 | November 12, 2009 | Mejdrich et al. |
20090282197 | November 12, 2009 | Comparan et al. |
20090282211 | November 12, 2009 | Hoover et al. |
20090282214 | November 12, 2009 | Kuesel et al. |
20090282221 | November 12, 2009 | Heil et al. |
20090282222 | November 12, 2009 | Hoover et al. |
20090282226 | November 12, 2009 | Hoover et al. |
20090282227 | November 12, 2009 | Hoover et al. |
20090282419 | November 12, 2009 | Mejdrich et al. |
20090285222 | November 19, 2009 | Hoover et al. |
20090287885 | November 19, 2009 | Kriegel et al. |
20090307714 | December 10, 2009 | Hoover et al. |
20100070714 | March 18, 2010 | Hoover et al. |
20120203971 | August 9, 2012 | Hoover et al. |
20120209944 | August 16, 2012 | Mejdrich et al. |
20120215988 | August 23, 2012 | Kriegel et al. |
1599471 | March 2005 | CN |
01283663 | November 1989 | JP |
05225153 | September 1993 | JP |
07311750 | November 1995 | JP |
08185380 | July 1996 | JP |
10232788 | September 1998 | JP |
10240707 | September 1998 | JP |
2005018620 | January 2005 | JP |
2005513610 | May 2005 | JP |
2005513611 | May 2005 | JP |
2005521124 | July 2005 | JP |
2006515690 | June 2006 | JP |
2009110512 | May 2009 | JP |
2007010461 | January 2007 | WO |
- U.S. Appl. No. 12/117,897, filed May 9, 2008, Hoover, et al.
- U.S. Appl. No. 12/031,733, filed Feb. 15, 2008, Hoover, et al.
- U.S. Appl. No. 12/108,846, filed Apr. 24, 2008, Kuesel, et al.
- U.S. Appl. No. 12/108,770, filed Apr. 24, 2008, Mejdrich, et al.
- U.S. Appl. No. 12/029,647, filed Feb. 12, 2008, Hoover, et al.
- U.S. Appl. No. 12/118,017, filed May 9, 2008, Comparan, et al.
- U.S. Appl. No. 12/118,059, filed May 9, 2008, Mejdrich, et al.
- U.S. Appl. No. 12/117,875, filed May 9, 2008, Hoover, et al.
- U.S. Appl. No. 12/121,222, filed May 15, 2008, Kriegel, et al.
- U.S. Appl. No. 11/936,873, filed Nov. 8, 2007, Hoover, et al.
- U.S. Appl. No. 12/135,364, filed Jun. 9, 2008, Hoover, et al.
- U.S. Appl. No. 11/937,579, filed Nov. 9, 2007, Mejdrich, et al.
- U.S. Appl. No. 12/102,033, filed Apr. 14, 2008, Heil, et al.
- U.S. Appl. No. 12/118,272, filed May 9, 2008, Kuesel, et al.
- U.S. Appl. No. 12/118,039, filed May 9, 2008, Hoover, et al.
- U.S. Appl. No. 11/945,396, filed Nov. 27, 2007, Hoover, et al.
- U.S. Appl. No. 12/015,975, filed Jan. 17, 2008, Comparan, et al.
- U.S. Appl. No. 12/117,906, filed May 9, 2008, Hoover, et al.
- U.S. Appl. No. 12/233,180, filed Sep. 18, 2008, Hoover, et al.
- U.S. Appl. No. 12/113,286, filed May 1, 2008, Heil, et al.
- U.S. Appl. No. 11/955,553, filed Dec. 13, 2007, Comparan, et al.
- U.S. Appl. No. 12/031,738, filed Feb. 15, 2008, Hoover, et al.
- U.S. Appl. No. 11/972,753, filed Jan. 11, 2008, Mejdrich, et al.
- U.S. Appl. No. 12/060,559, filed Apr. 1, 2008, Comparan, et al.
- U.S. Appl. No. 11/926,212, filed Oct. 29, 2007, Hoover, et al.
- U.S. Appl. No. 12/118,298, filed May 9, 2008, Heil, et al.
- U.S. Appl. No. 12/118,315, filed May 9, 2008, Mejdrich, et al.
- U.S. Appl. No. 11/938,376, filed Nov. 12, 2007, Mejdrich, et al.
- U.S. Appl. No. 12/121,168, filed May 15, 2008, Hoover, et al.
- Office Action Dated Jul. 20, 2009 in U.S. Appl. No. 12/031,733.
- Kuskin, et al.; The Stanford Flash Multiprocessor; Jun. 6, 1996; Stanford University.
- Office Action, U.S. Appl. No. 12/113,286, Oct. 14, 2010, pp. 1-18.
- Final Office Action, U.S. Appl. No. 12/113,286, Feb. 18, 2011, pp. 1-19.
- Office Action, U.S. Appl. No. 12/113,286, Feb. 7, 2012, pp. 1-17.
- Office Action, U.S. Appl. No. 12/113,286, Jul. 19, 2012, pp. 1-12.
- Notice of Allowance, U.S. Appl. No. 12/113,286, Dec. 12, 2012, pp. 1-13.
- Kumar et al., “A Network on Chip Architecture and Design Methodology,” 2002, IEEE, 8 pages.
- Notice of Allowance, U.S. Appl. No. 12/031,738, Mar. 12, 2013.
- Notice of Allowance, U.S. Appl. No. 12/118,059, Mar. 21, 2013.
- Office Action, U.S. Appl. No. 13/445,005, Dec. 14, 2012.
- Office Action, U.S. Appl. No. 13/461,913, Jan. 24, 2013.
- U.S. Appl. No. 13/778,862, Feb. 27, 2013.
- Gupta et al., “Synthesis and Simulation of Digital Systems Containing Interacting Hardware and Software Componenets”, 29th ACM/IEEE Design Automatic Conference, 1992, pp. 225-230.
- Luca Benini et al., “Network on Chips: A New SoC Paradigm”, Computer IEEE, Jan. 2002, vol. 35, Issue 1, pp. 7-78.
- Yutaka Yamada et al., “Analysis about Topologies of Network on Chip”, IPSJ SIG Technical Report, Information Processing of Japan, vol. 2004, No. 123, pp. 35-40.
- Office Action, U.S. Appl. No. 11/936,873, Apr. 22, 2013.
- Office Action, U.S. Appl. No. 12/102,033, Jun. 6, 2013.
- Office Action, U.S. Appl. No. 13/440,589, May 23, 2013.
- Final Office Action, U.S. Appl. No. 13/461,913, Jun. 4, 2013.
- Office Action, U.S. Appl. No. 13/778,862, Jun. 14, 2013.
- Taylor et al., “System on Chip Packet Processor for an Experimental Network Service Platform”, Global Telecommunications Conference (GLOBECOM'03), Dec. 2003, pp. 3933-3937, vol. 7, IEEE Xplore Digital Library (online), DOI: 10.1109/GLOCOM.2003.1258967.
- Intel, “Intel® E8870 System Chipset: The Cost-Effective Solution for Scalable Servers”, Jun. 2002, pp. 1-10, Intel, USA.
- Virtanen et al., “NoC Interface for a Protocol Processor”, IEEE Norchip Nov. 2003, pp. 1-04, University of Turku, Finland.
- Walter et al., “BENoC: A Bus-Enhanced Network on-Chip”, Center for Communication and Information Technologies (CCIT) Report, Dec. 2007, pp. 1-09, Technion, Israel Institute of Technology, Haifa, Israel.
- Furber et al., “Future Trends in SOC Interconnect”, Proceedings of the International Symposium on System-on-Chip (SoC), IEEE Computer Society (online publication), Aug. 2000, 4 pages, USA.
- Bolotin et al., “The Power of Priority: NoC based Distributed Cache Coherency”, 1st International Symposium on Networks-on-Chip (NOCS'07), May 21, 2007, pp. 117-126, IEEE Xplore Digital Library (online), DOI: 10.1109/NOCS.2007.42.
- Mereu, “Conception, Analysis, Design and Realization of a Multi-socket Network-on-Chip Architecture and of the Binary Translation support for VLIW core targeted to Systems-on-Chip”, Mar. 2007, pp. 42-143.
- Huneycutt, et al., “Software Caching using Dynamic Binary Rewriting for Embedded Devices”, Sep. 2001, Proceedings of the International Conference on Parallel Processing, 10 pages.
- Cifuentes, et al., “Walkabout—A Retargetable Dynamic Binary Translation Framework”, Sun Microsystems Laboratories, Jan. 2002, 13 pages.
- Issenin et al.; “Data Reuse Driven Memory and Network-on-Chip Co-Synthesis”, In Proceedings of International Embedded Systems Symposium ( IESS), May 30-Jun. 1, 2007.
- Kavaldjiev, et al., “Providing QoS Guarantees in a NoC by Virtual Channel Reservation”, In Proc. of Int. Workshop on Applied and Reconfigurable Computing (ARC), Mar. 2006, pp. 1-12.
- Monchiero, et al, “Exploration of Distributed Shared Memory Architectures for NoC-based Microprocessors”, Journal of Systems Architecture, vol. 53, Issue 10, Oct. 2007, pp. 1-8.
- Al-Hashimi; “System-on-Chip—Next Generation Electronics”, May 2006, Chapter 18 (“Asynchronous on-chip networks”), pp. 1-32, The Institution of Electrical Engineers (IEE Press).
- Kavaldjiev et al., “A Virtual Channel Network-On-Chip for GT and BE Traffic”, Emerging VLSI Technologies and Architectures, Apr. 2006, 6 pp., IEEE Computer Society Annual Symposium on VLSI, Los Alamitos, CA, USA.
- Master Dissertation, University of Electronic Science and Technology of China, 2007, pp. 0-35 and pp. 36-81 (includes English abstract).
- China Academic Journal Electronic Publishing House, 1994-2010, pp. 0-30 and pp. 31-66 (includes English abstract).
- Nollet et al., “Centralized Run-Time Resource Management in a Network-on-Chip Containing Reconfigurable Hardware Tiles” [online] [retrieved Jul. 15, 2011], 6 pages, retrieved from Internet: http://portal.acm.org/ft—gateway.cfm?id=1049106&type=pdf&CFID=32720390&CFTOKEN=986277114.
- Wikipedia, “Parallel Computing”, Wikipedia [online], URL: http://en.wikipedia.org/wiki/Parallel—computing, Jan. 19, 2007, pp. 1-6, USA.
- Pande et al., “Performance Evaluation and Design Trade-Offs for Network-on-Chip Interconnect Architectures”, IEEE Transactions on Computers, vol. 54, No. 8, Aug. 2005, pp. 1025-1040, IEEE Computer Society, USA.
- Radulescu et al., “An Efficient On-Chip Network Interface Offering Guaranteed Services, Shared-Memory Abstraction, and Flexible Network Configuration”, from Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE'04), held in Paris, France Feb. 2004, pp. 878-883, vol. 2, IEEE Computer Society, USA.
- Samman et al., “Networks-On-Chip Based on Dynamic Wormhole Packet Identity Mapping Management”, VLSI Design, Aug. 7, 2008, 15 pp., vol. 2009, Article ID 941701, Hindawi Publishing Corporation, USA.
- Hansson et al. “Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip”, Jan. 6-10, 2007, vol. 2007, 10 pages.
- Kavaldjiev, “A Run-Time Reconfigurable Network-on-Chip for Streaming DSP Applications”, University of Twente [online], Jan. 2007 [retrieved Feb. 6, 2014], Retrieved from Internet: <URL: http://eprints.eemcs.utwente.nl/9192/01/thesis—print.pdf>, whole document.
- Office Action, U.S. Appl. No. 11/936,873, Feb. 12, 2014, pp. 1-20.
- Office Action, U.S. Appl. No. 12/102,033, Sep. 25, 2013, pp. 1-15.
- Office Action, U.S. Appl. No. 13/453,380, Oct. 3, 2013, pp. 1-18.
Type: Grant
Filed: Feb 27, 2013
Date of Patent: Sep 23, 2014
Patent Publication Number: 20130173863
Assignee: International Business Machines Corporation (Armonk, NY)
Inventors: Timothy H. Heil (Sammamish, WA), Robert A. Shearer (Rochester, MN)
Primary Examiner: Mardochee Chery
Application Number: 13/778,862
International Classification: G06F 12/08 (20060101); G06F 12/12 (20060101);